This event has passed, but you can find the recordings here.
The process of having or moving IT workloads and services to the cloud can be a great way to save money, improve agility, and access new technologies. However, it also introduces new security challenges. Cloud environments are often more complex than traditional on-premises environments, and they have more vulnerabilities. This makes them a target for cyberattacks. In this webinar, we will focus on and discuss the security challenges related to Identity and Access Management and how to mitigate them. We will cover topics such as defining and implementing access control policies, user identities and access privileges. We will also cover the monitoring and auditing of access activities and showcase how to use open-source tools to manage identity access. This webinar is intended for security professionals who are responsible for securing cloud environments, cloud adopters and enthusiasts who would like to know more about cloud security and cloud IAM.
Program
10.00-10.15: Introduction & Welcome
10.15-10.35: Cloud Security Best Practices Recap
10.35-11.00: Access Control and Management
11.00-11.40: Identity and Access Management Live Demo – Open-source Tools
11.40-12.00: Q&A & Conclusions
Key Learnings
- Cloud security is important for everyone. Cloud environments are often more complex than traditional on-premises environments, and they have more vulnerabilities. This makes them a target for cyberattacks. In this webinar, we can help you understand how to secure your cloud environment and protect your data from cyberattacks.
- There are a number of things you can do to secure your cloud environment. These include defining and implementing access control policies, managing user identities and access privileges, monitoring and auditing access activity, protecting your data, and preventing and responding to cyberattacks.
- Open-source IAM platforms that can be used to manage users, roles, and permissions in cloud environments. This can help you secure your cloud environment by ensuring that only authorized users have access to your data and resources.
Don’t hesitate to contact us if you have specific plans or if you’re considering starting with cloud or open-cloud technologies
Register to participate online via Zoom webinars.
About the organizers
LSEC is a non-profit association focused on CyberSecurity. Learn more on leadersinsecurity.org
